“The victims are being deprived from, their creative inspirations, their resources and any of their forms of support. Targets are made to look ‘crazy’ with the evil technology that is used against them whether through the use of implants or some form of heterodyning, negative thought forms, or, directed energy weapons”.

Yesterday, on September 15th, 2018, I was seeking, near to a local supermarket for a shutable place to sit and arrange my raspberry pi tablet computer on a substitute of a laptop desk consisted by a semi-box packaging, made from carton, which I found left outside of the supermarket, in order to develop the virtual "joints" of the asparagus robotic harvester which I am currently designing. At that time, I noticed some bystanders looking at me awkwardly. Here is the explanation.

2. My private, permanent residence, at Loutros village, at northern Greece. As I have been since May 1st, 2018, unofficially exiled from Greece, my home became useless.

3. A monetary income from my, partially owned, rented appartment at Voula, Greece. This small income is being, arbitrarily confiscated by colonizers' operatives (pls see, "At the same time, I have a meager financial income, which I absolutely need, from the economic exploitation of part of my small real estate in Greece.

With the instigation of the Britons, this meager income is being misappropriated from me. The way of this embezzlement is, neither legal nor non-violent" - http://agorapoliton.gr/index.php?option=com_content&view=article&id=1856:despicable-choices&catid=27:apopseis&Itemid=62 and "One such person, the identity of which you can find out by asking the U.S. State's services, is being used systematically for contributing, along with others, in commiting many catastrophies, which have already taken place, upon some members of my own family and me, personally. U.S. State services, along with U.K. State state services are responsible e.g. for the Swanage incident, the Gounaraki school incident, the 04/1999 insident, my 28 month informal exile and currently, my recent involuntary departure from Greece" - http://agorapoliton.gr/index.php?option=com_content&view=article&id=1400:open-letter-to-the-us-ambassador&catid=27:apopseis&Itemid=62).

4. My mobile telephony subscription for exchanging SMS and gaining access to the Internet. The illegitimate manipulation of my telecommunications is certain. Once, I received an email refering to previous emails that I hadn't received. And the technical staff of a public domain's portal (see above) verified that certain SMSs which I never received were actually sent to my mobile phone.

5. My private, passenger car. Recently, my car was confiscated, after technical authorities had found technical flaws, by the Austrian Police. And few days after the Austrian police released my car, the German Police immobilized my car after a new technical inspection of a local technical authority found technical flaws. My car remains immobilized until I replace some consumable spare parts worth around 200 euros.

My forms of support are,

1. My father, Takis Bompolas (actually was). My father, which was a charismatic personality and a political dissident, according to sufficient indications, was murdered by the U2RIT's Russian branch, after having been, unimaginably, tortured for, approximatelly, 40 years (My father's death - http://agorapoliton.gr/index.php?option=com_content&view=article&id=1869:my-father-s-death&catid=27:apopseis&Itemid=62).

2. My mother, Olga Bompola. The colonizers' operatives, according to existing, undeniable legal evidence, framed and disabled my mother, as follows. My kind mother, was lured, by U2RIT's operatives to accept, at least, one administrative position of moderate authority by undertaking the governance of corresponding organizatinal form/s, which, unavoidably, involved the legal signing of voluminus documents. Then, two of these operatives, the identiies of which, probably, are known to me, managed to "drug and madden her with opiates beforehand" for making her, unable to prepare herself the legal docments which she was going to sign and unable to consentrate enough to avoid putting hers signature to any white page that might had been, accidentally, left within a pile of documents that was given to here, to sign. After see had signed a lot of documents, certain legal developments made, hers offering to me any kind of support, almost impossible. On January 26th, 2015, when my mother was deprived partially from the conforts that she was enjoying till then, I, probably, received, through the social media, implied threats against my life.

3. My friends. Most of my friends, most probably, have been influenced, either, by the ordinary procedures of gang-stalking, or, by the combination of, Greece's coup d' eté and my political activism. Greece's political etablishment is routhless and far more catastrophic than the former's GDR.

4. My relatives. It is improper, the least, to publicize personal information about them. Neverheless, they can't offer me support. The colonizers do not respect anything. The members of the U2RIT's non-uniformed army are individuals, most probably, "drugged and maddened by opiates beforehand" thus they are prone to commit any kind of atrocity, against any defenseless and innocent civilian.

As being a legitimate political dissident, a Human Rights' activist, and a victim of the British involuntary experimentations, I have been deprived, through the arbitrary, illegitimate, inhumane and immoral methods of gang-stalking, of all my resources and my forms of support.

At the same time, some of the European, States and/or Security Authorities, remain unwilling and/or unable, to enforce either, the corresponding domestic law, or, the international treaties/law, by providing to me, legitimate protection against gang-stalking and support.

For the above reasons, I have been forced to become poor, I buy my food with money that I earn by recycling empty bottles and by solicited tips, I live in my small, passenger car and due to poverty, I wash myself less frequently than I should, I wash my clothes less frequently than I should and the condition of my clothes remains less proper than it should.

And here is, according to my opinion, the intended goal, on behalf of the U2RIT's colonizers: the bystanders, of the supermarket that I mentioned at the begining of the preseng article, possess so-called "asymmetric information", meaning, they only see an individual, who doesn't smell good; some of the clothes of which, are ragged; whose glance does not create the impressions of over-nutrition; who carries in his hand a carton-made semi-box and wonders around for no obvious reason, while they remain totally ignorant about all the above explanations.

The combination, of this asymmetric information and the complementary ignorance, gives the opportunity to any colonizing criminal to rise a false accussation against myself thus offering a "face saving" false excuse to the Security Authorities, of some countries, to comit any plausibly deniable crime, on behalf of the colonizers, against myself.

Conluding, I wish to clarify that, for the legitimate political dissidents' gradual extermination, less responsible are the ignorant bystanders and more responsible are those who possess adequate information about the contemporary legitimate dissidents', identities, morality of their personal characters, innocence and usefullness of their activism, and do nothing to support them.

It is, thus, undeniable that, sadly, the immorality of the many threatens the existence of the morality of the few.

Bernd Seiffert was born on 14.10.1983 in Aachen and died on 28.04.2010 with only 26 years in Mönchengladbach.

He grew up with three siblings in Horbach, a small village near Aachen and attended the Catholic Primary School in Horbach. After attending elementary school, he was a student at the historic Kaiser Karls Gymnasium in Aachen. After gaining his Abitur there, Bernd Seiffert graduated from the Rheinisch-Westfälische Technische Hochschule (University of Applied Sciences) with a degree in computer science specializing in system integration. After successfully completing his training, Bernd Seiffert worked as a software developer. In addition to his professional activity, he consistently carried out social and political projects and cared for people who suffered from serious mental disorders and the long-term damage of a drug intake. Over time, Bernd Seiffert raised increasing criticism against the conditions in the German psychiatric and against the administration of psychotropic drugs. As a member of the board of directors of the NRW state association for mental health professionals, he was involved in 2009 in a new legal situation in Germany concerning the Patient Assistance Act. In February 2010 Bernd Seiffert wrote the book "The Crimes of Psychiatry: A Summary by Bernd Seiffert". This book has been cited numerous and is still very popular and in demand in some professional circles. About a year after the publication of the book "Crimes of Psychiatry", the Federal Constitutional Court ruled that "psychiatric compulsory treatment is incompatible with the German Basic Law and illegal in Baden-Württemberg, ie illegal" (March 2012, Matthias Seibt, Newsletter no. 1 of the BPE, page 10).

However, Bernd Seiffert was not only known for his psychiatric and antipsychiatric work, but also for his self-sacrificing donations and his big heart for poor and needy children. Throughout his life, Bernd Seiffert donated large sums of money to the Kindermissionswerk and to other charitable projects and organizations. Actively, he endeavored to reduce the suffering of hungry and neglected children. Finally, before his death in a will, Bernd Seiffert stated that his entire fortune should be donated to the Kindermissionswerk "to help those who really need it" (2006, Bernd Seiffert's Will).

Bernd Seiffert died on April 28, 2010 in Mönchengladbach. When he was traveling on a street at night with his illuminated bicycle, a pickup truck suddenly hit him from behind. The drunk driver of the van left Bernd Seiffert to call without help on the deserted street and fled. Bernd Seiffert was found after some minutes on the lonely road, but he died in a hospital as a result of the collision. It was only through extensive investigations that the police were able to arrest the person who had previously been convicted and presented himself as a cocaine consumer in court. The perpetrator was sentenced to nine years imprisonment and five years driving license withdrawal in a lawsuit for attempted murder.

Christodoulos (17 January 1939– 28 January 2008) (Greek: Χριστόδουλος, born Christos Paraskevaidis, Χρήστος Παρασκευαΐδης) was Archbishop of AthensChristodoulos (17 January 1939– 28 January 2008) (Greek: Χριστόδουλος, born Christos Paraskevaidis, Χρήστος Παρασκευαΐδης) was Archbishop of Athens and All Greece and as such the primate of the Autocephalous Orthodox Church of Greece, from 1998 until his death, in 2008. In June 2007, Archbishop Christodoulos was hospitalised in Aretaeion Hospital of Athens and diagnosed with colonic adenocarcinoma, hepatocellular carcinoma in the right lobe of the liver. Following colonic tumor resection, transplantation specialist Professor Andreas Tzakis, of the University of Miami Miller School of Medicine, announced that the Archbishop would be transferred to Jackson Memorial Hospital in Miami, Florida in order to undergo liver transplant. On 8 October 2007 the transplant was cancelled because of metastases. Following suggestions by his attending doctors, Christodoulos returned to Athens on October 26 for medical treatment. In his final days, the Archbishop refused to be hospitalised, preferring to remain at his home in Psychiko, where he died on 28 January 2008, one week and four days after his 69th birthday. After his death the Greek government announced a four-day national wake during which his body lay in state at the chapel of the Cathedral of the Annunciation. [wiki]and All Greece and as such the primate of the Autocephalous Orthodox Church of Greece, from 1998 until his death, in 2008. In June 2007, Archbishop Christodoulos was hospitalised in Aretaeion Hospital of Athens and diagnosed with colonic adenocarcinoma, hepatocellular carcinoma in the right lobe of the liver. Following colonic tumor resection, transplantation specialist Professor Andreas Tzakis, of the University of Miami Miller School of Medicine, announced that the Archbishop would be transferred to Jackson Memorial Hospital in Miami, Florida in order to undergo liver transplant. On 8 October 2007 the transplant was cancelled because of metastases. Following suggestions by his attending doctors, Christodoulos returned to Athens on October 26 for medical treatment. In his final days, the Archbishop refused to be hospitalised, preferring to remain at his home in Psychiko, where he died on 28 January 2008, one week and four days after his 69th birthday. After his death the Greek government announced a four-day national wake during which his body lay in state at the chapel of the Cathedral of the Annunciation. [wiki]

Rauni-Leena Tellervo Luukanen-Kilde

Rauni-Leena Tellervo Luukanen-Kilde née Valve (15 November 1939 – 8 February 2015) was a Finnish physician who wrote and lectured on parapsychology, ufology and mind control.

Luukanen-Kilde was born in Värtsilä. She had to flee with her family in infancy during the Second World War and was raised in Helsinki. She studied medicine at the universities of Oulu and Turku, graduating in 1967. She was at one point the only medical practitioner at the hospital in Pelkosenniemi, performing dental and veterinary work as well. In March 1975, she became a provincial medical officer in Rovaniemi, Lapland; she became chief medical officer for Lapland.

In 1982, as Rauni-Leena Luukanen, she published Kuolemaa ei ole (There Is No Death). She had been interested in the paranormal since she was a teenager, but the 1985 car accident which led to her retirement was reportedly "significant in her turn to ufology". She appeared as a featured speaker at UFO conferences, helped organize the first international conference on extraterrestrials in Finland and authored books about UFOs, alien abductions, mind control and conspiracy theories. Luukanen-Kilde claimed to have been "rescued" from danger by extraterrestrials, and to have esoteric skills and knowledge as a result of her relationship with them. She said that there was a secret exchange program between humans and aliens that was being deliberately suppressed by "powerful Western governments", particularly the United States. Luukanen-Kilde also said that secret military and intelligence agencies were practising mind control technology on the world population using cell phones and supercomputers and that a plot to kill most of the Earth's population using the swine flu vaccine was being carried out by the WHO, Henry Kissinger and the Bilderberg Group. Her article on cybernetic implants as a means of control is widely circulated. She appears in the 1999 film Revelations: The End Times, Volume 2.

Luukanen-Kilde married a Norwegian diplomat in 1987 and moved to Norway in 1992. After her husband's death in 1996, Luukanen-Kilde died in February 2015 in Vaasa after a long illness, having returned to Finland shortly before.

Yesterday medical Dr. Rauni-Leena Luukanen-Kilde died in her homeland Finland by severe cancer all over her body, her Finnish cousin told White TV today. White TVs Dr. Henning Witte talked to Rauni about ten days ago on telephone in Finland, not knowing it was the last time. She complained about that she suddenly got cancer as a result of beaming technology, mind control scalar waves. Her complications got so severe that she was forced to leave her home in Norway to a hospital in Finland, where her caring cousin is living.

Rauni Kilde complained over the rude manner of the Norwegian ambulance and that they refused her choice of Norwegian hospital, and over the doctor at the wrong hospital, which wanted to give her morphine against her will. She was allergic against morphine, which she told the doctor. She said to her friend Elisabeth Nyström Barringer that she was afraid, that the Norwegian hospital would kill her, and that she was better in the Finnish hospital and out of danger for her life.

During the last week it was not possible to talk to Rauni any longer and the doctors indicated death.

Here one of her last emails to a friend sent 14th January 2015:

Thank you XXX,I was badly attacked 17-18.decwith psychotronicweaponslayng at the floor with EXTREME pains until after midnight I had to call an ambulance 19th to go to hospital where malpractice started from first minute,male dr hit my right kidney so hard that My urine wasbloody the next day, for three daysfemale dr did not touch meAT ALL, I had said it all comes from beaming-she said noone will believe you-I said insiders doEven my heart was not listened to...she stood 2-3meters away from me all three days until I said Iwant to go home and did I have a seriousillness now which they have caused with radiation and it was now activated After some bedrest I got assistance to travel with wheelchair to Finland where I will have all tests redoneFinland is not a NATO country having to follow USorders and it is right now much better for me to be here and go tohospital here.In addition my old cat dissappeared and at nightI got a flash vision they hit and smashed her skull with some wooden blanck...Even if they tried toeliminate me-by giving 2 times an injection i was allergic to I WILL SURVIVE says my automatic writing even to be able to perform later.. But it takes time,I am totally out of energy still,mostly in bed all days..Please DONOT sperad the wordbut if you kow any healers I would appreciate to get their help because I try to get better ONLY with altrnative methods and if it would succeed it would be a medical miracle showing the power of thought and healing.Geetings to YYYYYY,too Love and light Rauni

Dr. Rauni-Leena Luukanen-Kilde was very well known all over the world for her enlightening on the topics reincarnation, ufos and mind control. She taught that we must not fear death because there is no real death, only that the astral body and the soul leave the human body. She knew because she had out of body experiences.

She was a very courageous woman and suffered from many attempts to her life and harassment of all kinds, especially electronic harassment. The dark forces did not like her eye-opening work for humanity.

Dr. Rauni-Leena Luukanen-Kilde with Elisabeth Nyström Barringer at the first world conference on mind control in Brussels 20th November 2014 (photo Henning Witte)

When Henning Witte met Rauni Kilde personally the last time on the Covert Harassment Conference in Brussels the 20th November 2014 she was very fit and healthy. No sign of illness especially no cancer; take a look to her body language in the video below when she was giving her last speech on chips in mind control.

Rauni and Henning sat together with ti Magnus Olsson on the board of EUCACH, the first association for European targeted individuals (ti), victims of electronic harassment, mind control. The dark forces had severely pushed for an other candidate to join the EUCACH board in order to control it, but Rauni Kilde and Henning Witte stand firm. Here could be a reason to murder her to open the way for puppets of the dark side, as they did with all the other mind control groups, especially the German one.

A second reason to kill Rauni Kilde could be her last book. She had complained about problems with her publisher, which caused a severe delay of the book. We can only hope it will be published in a way that Rauni wanted. She was the only author.

The death of Dr. Rauni-Leena Luukanen-Kilde is a huge loss for humanity, because no one combined so much knowledge and pedagogical skills as she to explain the most secret topics of the world.

Rauni we miss you terribly! Thank you for all your efforts and gifts to all of us! You really made a difference! See you soon!

Efstathios "Tassos" Nikolaou Papadopoulos (Greek: Ευστάθιος (Τάσσος) Νικολάου Παπαδόπουλος; 7 January 1934 – 12 December 2008) was a Cypriot politician and barrister who served as the fifth President of Cyprus from February 28, 2003 to February 28, 2008.

Political career

Papadopoulos returned to Cyprus on the 20th of March 1955, ten days before the start of EOKA's armed struggle against British colonialism. At first he joined EOKA and became regional chief operations in Nicosia, whilst Polycarpos Yiorkadjis was held captive. Soon however, he became active in PEKA, the political arm of the EOKA guerilla organisation. In 1958, aged 24, he became PEKA's general secretary.

He took part in the London Conference in 1959 and was one of the two delegates (besides the AKEL delegates) who voted against the signing of the London and Zurich Agreements. He was also one of the four representatives of the Greek Cypriot side at the Constitutional Commission which drafted the Constitution of the Republic of Cyprus.

1974 Coup d'etat

In 1974 Papadopoulos was imprisoned by the military forces responsible for the coup d'état. Belonging to Makarios' cabinet made him a prime target and he was rounded up in Famagusta where he was imprisoned. He was released on the evening before the first Turkish invasion of Cyprus.

Death

Tassos Papadopoulos died on December 12, 2008 at 13:05 pm of small cell lung carcinoma. He was a heavy smoker. Papadopoulos had been admitted to the Intensive Care Unit of the Nicosia General Hospital on November 22 for the disease. The funeral took place on December 15, 2008 in Agia Sophia church in Nicosia.

The methods which are being used, on behalf of the U2RIT, for, either, politicaly neutralizing, or, exterminating, legitimate political Greek dissident are atrocious.

For example, in Greece, from all the front-organizations which U2RIT maintains there are also certain psychiatric hospitals the medical personell of which remain loyal to U2RIT. These front-organizations are being used to illegitimately, hospitalize mentally healthy political dissidents after their becoming poisoned by chemical substances which induce abnormal behaveour. More specifically, the targeted political dissident is being offered, e.g. a shealded box of Cubanian cigars, which have been poisoned with liquid mercury. The targeted dissident inhails evaporated mercury and it’s neural systems starts manifesting the side-effects of mercury-poissoning. Then, the targeted individual becomes slandered as being “crazy” and in some cases it is forced to become hospitalized in these front-organizations the medical personell of which, as being complicit, avoids to perform a proper examination for tracing the existing toxic substances.

For one such criminal poisoning against a legitimate political dissident, which involved Cubanian cigars and, almost certainly, mercury, I have been an eye witness and unrelated bystunder.

Also, according to insufficient but strong indications there is, probably, an atrocious kind of extortion going on against Greek, political dissidents and politicians. More specifically, the colonizers, probably, extort, either, Greek political dissidents, or, Greek politicians, by deliberately causing on them some kinds of treatable (exclusively by colonizers’ proprietary medications, but not curable) forms of cancer and then they demand from the victims, either, to accept the systematic administration, exclusively for politically controlling them, of certain, so-called “psychiatric medications”, otherwise, they threaten them that they shall let them die.

While Greece is being violated by quite many ways, for example, there has been the “Cooper” treaty treason; the Kirki copper mine; the Greece’s elections which remain controlled by a single private company since 1981; there are Greece’s natural leadership members’ unexplained deaths, etc., the rest of the European Union’s member-States remain politically silent.

The reason for this silence, according to my opinion is that, this is what the NATOic part of Europe is.

Therfore, the longer Greece remains an E.U.’s member-State, while E.U. maintains the current structure and dynamics, the longer, the Greek Nation’s members, shall keep suffering from the colonizing Nation’s ruthlesness and criminality.

Christos Boumpoulis

economist

P.S.: Since 1999, when I started realizing the criminal colonization of Greece, on behalf of the U2RIT, there have been systematic attempts, on behalf of the colonizers, for criminal psychiatrists to approach me, socially, in order to fabricate false medical “diagnoses” and to produce false testimonies, against my, actually, normal mental health. In order to protect myself from such a criminal activity, I studied, by visiting related medical conferences, the psychiatrists’ demenour, in order to recognize them, visually, with a relativelly strong certainty and I, also, developed an almost unbeatable, verbal method for verifying their, criminal, dishonesty. The Nations, the legislation of which, still permits this, atrocious, inhumane and essentially murderous, part of the medical domain, to destroy, innocent and mentally healthy, civilians, according to my opinion, they can very hardly prove that they, actually, enjoy Freedom, at all.

ETK Instruction: I have reproduced Dr. Rauni Kilde’s chapter 18 here because it is an instruction manual for community gang stalkers. These same techniques, and perhaps this same manual, were evidently also used in the FBI’s COINTELPRO (counter-intelligence program) and Operation Gladio/Stay Behind Operations in Europe between about 1950 and 1990. They also accurately describe the U.S. Military-Intelligence’s ongoing, global gang stalking operations as documented in “New World War: Revolutionary Methods for Political Control” by Mark M. Rich (2011). All these top-secret operations went on, officially undetected, for decades; Gladio/Stay Behind functioned secretly and illegally throughout Europe for four decades, when it was exposed in 1990 by Italian Prime Minister Andriotti. Shortly thereafter, the European Parliament made a resolution condemning Gladio (see Appendix 1), but acknowledged that it may still be operational!

Like American author, Gloria Naylor (see her book, “1996”), and countless others, Dr. Rauni Kilde was a “Targeted Individual” (TI) for decades. She was harassed, defamed, tortured,and eventually, on Feb. 9, 2015, murdered in this program.

As neither Dr. Kilde nor her publisher were/are native English speakers, there are minor grammatical errors in the text. To make the text read more smoothly, I occasionally add additional words, which I place in parentheses.

In her book, Dr. Kilde does not specify where she obtained this instruction manual or who authored it. However, as Chief Medical Officer for Northern Finland, she was an “insider” who was invited to many open and secret conferences. Her husband was also a political insider. Thus, she was privy to top-secret documents. Doubtless, she does not divulge the author(s) of this document in order to protect her informant(s). I note that many phrases and spellings are peculiar to the British form of the English language. This could reflect Dr. Kilde’s spelling and usage patterns. OR, it could reflect the fact that the original document was written by British military-intelligence operatives. If so, we may speculate that it was authored by an individual or group associated with the Tavistock Institute of Human Relations, which grew out of the Psychological Warfare Division of the British Army at the close of World War I and has, for decades, been the world’s “brainwashing center.”

Regardless of its exact authorship, this is an extremely important document that should be read and understood by all “targets.” Clearly, this is a manual for psychological warfare that presents the methods by which an extremely complex military-secret service hierarchy surveilles, punishes, “neutralizes” and ultimately murders its designated “targets.” There are obvious comparisons to be made with the CIA’s KUBARK torture manual, which has been employed in Vietnam, Latin America, the Middle East, and indeed, in CIA “black sites”/”extraordinary rendition” centers throughout the entire world. The psy-war system described herein bears a remarkable similarity to the operations and procedures of the U.S. military’s “Fourth Generation Warfare”/”Civil-Military Operations”/”Military Operations Other Than War”/”Unconventional Warfare”/”Asymmetrical Warfare”/”Psychological Warfare” and “Information Warfare” operations as detailed in Rich’s “New World War: Revolutionary Methods For Political Control.” (See Appendices 2 and 3 for a comparison of key terms in each program.) Indeed, the systems are identical.

The remarkable revelation provided here is that modern organized gang stalking operations are identical with, or nearly identical with, those used in the FBI’s secret COINTELPRO (counter-intelligence program) of the 1950s-1970s, the top-secret “Gladio” and other “Stay Behind Army” operations of Europe between 1950 and 1990, and the destabilization and citizen-elimination operations now being carried out in the name of “counter-terrorism” by the U.S. military in approximately 140 of the world’s 195 nations (see The World is the Battlefield, US SOCOM Involved in 134 “Counter-Terrorism” Wars).

Thus, we can properly understand the global organized gang stalking operations (which I refer to as GOG’s NeW GESTAPO for Global Organized Gang Stalking Neuro-Warfare Groups Electronic Slavery, Torture and PsyOp Operations) as a major component of the phony Global War on Terrorism and the “Full Spectrum Dominance” strategy of the Anglo-American-Israeli Empire. Welcome to the New World Order Antichrist-fascist-communist totalitarian police state in which the “battlespace” is the entire world and “you” are the enemy.

Further details regarding the advanced technologies now being used in covert global Organized Stalking/Electronic Harassment operations are provided in Appendix 4 (from Total Individual Control Technology by Ominsense.

Dr. Kilde’s Chapter 18 text is followed by these appendices:

Appendix 1: Key words and phrases, taken directly from this manual.

Appendix 2. Key terms from Rich’s “New World War: Revolutionary Methods For Political Control” (2011). (ETK comment: Note that the terms, definitions, military documents, laws, and patents provided by Rich prove the existence of the operations described in Kilde’s “manual.”

Appendix 3: European Parliament Resolution On Operation Gladio

Appendix 4: From Total Individual Control Technology by Omnisense

1. GENERAL

Operations in general are of the “active surveillance” type. Passive surveillance is watching a target covertly, to obtain information about the target. Active surveillance can include information gathering, but it (also) includes the agent making the target aware they are under surveillance. Beyond active surveillance, agents perform acts to keep the target uncomfortable, around the clock. Although operations are silently approved of, and covered for by the official justice system, (they are not) seen as criminal in nature by citizens who do not have a strong sense of right and wrong.

Agents must take great care that each and every act of punishment is DENIABLE. This means that should the target complain to police, (or) any other officials, or friends, neighbors, family members, or doctors, the nature of the punishment must be seen as the target’s “overactive imagination” or better yet, an indication the target is mentally ill.

(The system) has worked for years to recruit the medical establishment to help maintain deniability, and today, most targets (are) immediately labeled as mentally ill and often forced onto anti-psychotic medication when they complain. But their agents must still do their part skillfully (to) perform acts of punishment, so (that) almost anyone the target complains to will deny a crime against the target has taken place. As an agent, you will be trained in how to do this.

(The system) has been blessed with advanced technology which enables heavy punishment at times the target is in their home, silently, through walls, and this is very deniable. Agents must pass their initial training and demonstrate a high level of commitment to maintain community safety, and the ability to operate deniably, before they will be considered for advanced electronic punishment training. Electronic punishment training is beyond the scope of this manual.

The organization is very fortunate in that we have been able to recruit top specialists to back up field operations people. Psychologists are the key to find(ing) ways to maximize feelings of stress and hopelessness in the target, and degrading the target’s health, from many individual “minor” invasive punishment acts. Technician’s in all fields- telecommunications, electric power, building electrical and alarm systems, and utility employees in all fields use their positions to inflict many absolutely “normal-looking” problems on targets on an ongoing basis. And of course, the services of many skilled locksmiths are invaluable in this. As a community-based agent (CBA) you will have the privilege of working with a team capable of delivering better “justice” than the official system.

2. SURVEILLANCE

Surveillance is the foundation of all operations. Both community-based agent (CBA) visual surveillance and advanced electronic surveillance are used. This chapter will cover only local agent visual surveillance. Your local lead agent will schedule surveillance watches for each target in that community. Every target will have at least one CBA watching them (at) all times, even while at home and asleep. Each CBA surveillance team will be given a cell phone number for reporting target actions and movement to the local Control Center (CC).

Actions to be reported include, but are not limited to:

Target turns lights on to start the day.

Target uses toilet or shower

Target exits residence

Target drives away

Target arrives at work, or

Target shops or visits any other establishment or location.

Target arrives home

Target eats meal, at home or in restaurant

Target engages in sexual activity

Target turns lights off at the end of the day

Target turns light on in the middle of the night

Target travels out of town

Some of these observations will be performed by the Electronic Corps (EC), but CBA’s should attempt to make and report as many detailed observations of target activity as possible. The reason such detail is necessary is that the punishment phase of active surveillance requires that supervisors customize each punishment action to match the personality of (the) target, and the need to make each punishment action appear to be “life’s normal breaks.”

One important punishment function of surveillance is to sensitize the target. Targets are never told they are under surveillance or being punished. Instead, close, active surveillance and other activities, happening far to frequently to be written off as “life’s normal breaks,” will eventually cause the target to realize they are under surveillance and punishment.

As a community-based agent (CBA), you will be given specific instruction(s) on exactly when, where, and how to carry out punishment actions. As long as you carry out punishment instructions exactly as given, there is no way the target will be believed if they complain, and you will not be exposed to risk of action by law enforcement.

How well the punishment actions work depends on how accurate and complete your reports are in many situations(. The) Control Center (CC) acquires access to properties or apartments immediately next to the target’s homes or apartments. Because EC (Electronic Corps) has through-the-wall surveillance and punishment equipment, they will be reporting target activity along with community-based agents. In a typical setup, CBA’s may be posted in a parked car where the target’s home or apartment can be observed overnight, for example.

In this setup, the CBA in the car may be instructed to call, using walkie-talkie-style cell phones, another CBA (or team) waiting or patrolling by car nearby to follow the target, or, you may be assigned to follow the target yourself. You will receive instructions from your local center as to following the target.

Targets in transit may be either covertly or visibly followed. When in doubt, hang back a bit, and contact the center for instructions, as targets in transit can present many unanticipated situations. The Center will always have the target’s position monitored, so if a target gives the CBA the slip, it will assign other appropriate community based agents to pick up the target at the earliest opportunity. Be sure to notify (the Control Center) immediately if you lose the target.

When applying the visible following of a target, making the target uncomfortable because of your presence, you will be given instructions as to when to break off the following. Another CBA or CBA team may pick up the visible following, but once you have broken away, they advise that you are clear and ready for the next assignment.

3. INTERCEPTS

Intercepts are where community-based agents (CBA) will appear to “just coincidentally” cross paths, on foot, with the target. Once the target has been sensitized to the point of realizing they are under surveillance and punishment, they will recognize, and be made appropriately uncomfortable by, the simple act of multiple CBA’s “just happening to” cross paths with them.

Your local control center will instruct you as to how you will be cued to perform an intercept. Often you will have an on-site supervisor (OSS) position you, and give you hand signals as to when to start your movement to intercept the target. Because targets moving about aren’t always totally predictable, the success of CBA intercepts depends heavily on the Electronic Corps who have means of monitoring the exact whereabouts of every target, and through computer programs, predict exactly when and where a target will be as they move about the community. Your local OSS has a special means of receiving instant, silent instructions for the Center.

1. Intercepting CBAs may be asked to perform one of the following forms of intercept:

2. Simple path crossing, requiring the target to take evasive action to avoid collision, multiple CBAs sometimes perform this several times during a single outing by a target.

On foot, walking for an extended period on the opposite side of the street from walking target.

3. Arriving at a place known to be a favorite of the target, and simply occupying that place just as the target is about to arrive (restaurants, parks, public facility seating, even bus seats are examples); sometimes just “hanging out” in such a location at times and places where people don’t ordinarily do that.

4. Smoking, coin-jingling, whistling, or toe-tapping near the target at a location where the target is known to need to stand, as to wait for the bus, or standing right behind a target at a water fountain.

5. A group, as many as a dozen CBAs, may be assigned to arrive at a store just ahead of a target, and form a queue ahead of the target, spending time buying lottery tickets, to delay the target. (The target) is very tired and eager to get home after work, for example, or in a hurry.

6. Community-based agents may be assigned to leave a next door home or apartment exactly the same time as the target, repeatedly. Alternatively, a CBA may intercept the target a short way before home and arrive at exactly the same time as the target.

While these may seem like trivial acts, keep in mind that the target will have these “trivial” things happen every single day, and repeated intercepts like these will force the target to always watch for such acts, essentially ensuring the target never “has a nice day.” This is the goal, to ensure the target’s punishment. Similar intercept operations are performed with vehicles. The Center can schedule these every day the target commutes, and both to and from work. Vehicle intercepts are particularly effective when the target sees the same vehicle in an intercept convoy both in the morning and in the evening commute. (Because vehicle intercepts can be dangerous, CBA assigned to vehicle intercept duty must successfully complete a special training course prior to actual assignment.) Here are some examples of vehicle intercepts a community-based agent (CBA) can expect to be assigned.

-Parking so as to prevent a target’s leaving a parking area, and then disappearing.

-Parking commercial vehicles often, near target’s home with something unusual about these vehicles, such as there is no need for that trade, or just unmarked white vans to make the target think the van is there to conduct surveillance.

-Simple following, or leading, a short distance, but every day. Doing this, both during target commutes and then other times makes the target very uncomfortable.

-Passing as side street stop sign, then stopping an uncomfortable distance into oncoming traffic just as target is about to arrive at the side street, causing the target to have to slam on the brakes (this requires Control Center assistance and prompting by walkie-talkie style cell phone.

-For a CBA vehicle convoy, boxing in the target during a commute, forcing the target to travel at a lower speed than the target wants to travel. In some locations, the Center will supply special license plates to CBA vehicles with short words which have special meaning to the target.

-For a CBA convoy, and where the target is at a location (and time) where traffic is normally very sparse, cause heavy traffic, forcing the target to notice.

The ultimate vehicle intercept is the staged accident. This can be dangerous and is only assigned to very senior agents. However, it is possible to stage an accident so only the target knows it was staged. This is an excellent means of punishment where a target has committed a serious offense specifically against secret services by revealing their criminality to the public. Generally, staged accidents are done in jurisdictions where police strongly support the operations, so that the CBA driver is protected.

4. PHYSICAL SABOTAGE

Physical sabotage is an especially effective form of punishment when it is carefully limited to low value items, below the value where police will take the report seriously. For example, burning a target’s house down, or even stealing an expensive appliance, would bring official investigators into the picture, so that is not done.

Sabotage producing extreme safety hazards is generally not suitable for operations, because of the potential for bringing official investigators to an accident scene. So while damaging the brake system of a target’s vehicle is not allowed for community-based agents (CBAs), draining some of the oil, transmission fluid or radiator antifreeze is allowed, but not all of it. The goal is to make it looks as if the target is negligent in maintaining fluid levels, and generally not causing a catastrophic failure that non-targets might see as sabotage.

It is very important to apply punishment by way of a large number of small value sabotage acts, because that makes it look like the target is forgetful, exaggerating, or in some cases even delusional, if they complain about many cases of small value damage. The target’s associates will simply refuse to believe that anyone but the target is responsible.

Sabotage is very important in that it lets the target know they are totally helpless to stop it, and can’t even complain about it effectively without appearing mentally ill. (The) organization (is) very fortunate in that some people, hearing about sabotage from a target did the sabotage themselves, “to get attention.”

Sabotage is applied at the target’s home, workplace, and on their vehicle. This requires the assistance of locksmiths and alarm technicians. Your local Control Center will supply this help, and will bring specialists in from a distance in the case of rural areas.

Here are some examples of sabotage a community-based agent (CBA) may be assigned to carry out:

-Entering a vehicle, or home, and changing control and radio settings.

-Replacing window washer fluid with water, possibly destroying the system in winter.

-Scratching the paint on the target’s vehicle, scratching furniture and valuables.

-Tire sabotage, from removing some air right up to slashing a sidewall if authorized by the Center.

-Simulating a break in electric window heater strips.

-Cutting off the 4-way flasher button.

-Removing substantial amounts of oil, transmission fluid or antifreeze but not enough to cause catastrophic failure.

-Moving things around inside the vehicle to show the target someone got in.

-Unlocking the vehicle and leaving it unlocked, possibly even with door open.

-Small cuts to car’s upholstery.

-Unlocking the target’s front or back door and leaving it ajar while the target is away, even at midnight at New Year for Y2 hour.

-Moving furniture or carpets around fairly frequently to show the target someone was there.

-Stealing low-value items, especially items like scissors which can be easily misplaced, keeping them until the target replaces the item, then return the missing item, often in a place the target checked.

-Stealing important papers, especially those which will cost money to replace.

-Stealing irreplaceable photographs.

-While target is at work, remove mail from their box and toss it around. Repeatedly making wall pictures crooked.

-Setting clocks to the wrong time.

-Repeatedly dumping consumable supplies (e.g. coffee) to make the target think they are no longer capable of managing their supplies well.

-Starting small rips in new clothing, which are widened on repeated visits.

-Replacing clothing with similar items which are too small for the target, like for children what target does not have.

-Ironing inside button flags over, making buttoning the shirt or top difficult.

-Carefully working the tip of a knife through seams in any air mattress or cushion the target may own, including replacements, on a daily basis.

-Breaking zippers in clothes and bags, perhaps by pulling out a tooth or two.

-Shoving a knife through the soles of waterproof boots.

-At work, removing screws from the target’s office chair, or at home dinner table leaving only one screw of four, left to tilt the table with china.

-At work, damaging or destroying (if not extremely obvious) a target’s work from a previous day, (for example), the computer is broken again possibly worse.

-At work, replacing current copies of computer files with an older copy- particularly serious if target is a computer programmer.

-At work, where some employees are or can be recruited to be community-based agents, set up “mistaken deliveries” of heavy goods which block the target’s office.

-At work, if the target is responsible for parts of the operation which can be sabotaged, do so repeatedly just as the target starts eating lunch, or is about to leave for home.

-At work where the target is responsible for materials (that) can’t be locked up, sabotage or with special permission from the Control Center steal the material.

Thefts have to be carefully considered and authorized by your local Center, unless you have authorization, do not steal. One particularly effective type of theft is to remove small value, but often used items from the target’s premises. Once the target has been observed purchasing a replacement, the item is returned. This not only causes the target to spend money uselessly, (it also) imposes a feeing of total helplessness on the target.

5. SABOTAGING THE TARGET’S REPUTATION

Sabotaging the target’s reputation- and all that goes with it, such as ability to earn a living, business and personal relationships- is a very special operations category. Newer community-based agents will not be assigned to “engineer” the method, but will assist in passing “rumours,” which are the main means of destroying a target’s public image.

“Rumours” consist mainly of lies. However, in order to secure cooperation of specific members of the community to participate in the punishment phase, additional information keyed to appeal to the patriotic or community service sense of such community members may be used as well. As mentioned earlier, the organization has many top psychologists and psychiatrists on permanent staff at headquarters, and some in larger population centers. It is their responsibility to design the campaign to destroy the target’s reputation.

These people listed below can be approached and given information which will cause them to make the target’s association with them uncomfortable, or break off all contact with the target.

-Business contacts.

-Supervisors.

-Co-workers.

-Casual social contacts, such as clubs a target may be a member of, or a group that frequents a bar where the target is a patron.

-Friends.

-Local fraternal organizations- they are motivated by the public service, and are an excellent source of assistance in keeping the target under surveillance, and participating in the punishment phase as well.

-Store staffs at places the target shops.

-Target’s landlord.

-Target’s neighbors.

-Tradesmen who are likely to service the target’s home, car, or business.

-Bus drivers on the target’s route.

-Local children.

-City employees, including emergency medical technicians, ambulances.

-Homeless shelter staff and residents where applicable.

-Family members (surprisingly, many are ready to believe negative information.)

-Especially, personnel at places the target applies for work.

How intensely (these sabotage operations are carried out) is governed mainly by the need to prevent the target from (learning) that the negative rumors are being spread. The goal is to keep negative information covertly flowing into the community, in such a way that those receiving the information aren’t likely to tell the target. One might think that friends and family members would instantly notify the target and side with the target. Fortunately, experience shows that co-opting friends and family is surprisingly easy, once they are informed about the target’s criminal record. The Headquarters staff have developed techniques which by and large prevent that, but those techniques are beyond the scope of this manual. Suffice it to say that it is possible to apply “incentives” which cause even people closest to the target to cooperate. These incentives are applied by specialists from our organization at higher than the local level. For the community-level CBA, the work of sabotaging the reputation of the target takes the form of simply carrying out instructions from your Control Center as to what you say to whom, how, and when.

6. DISCREDITING TARGETS

While the powerful silent support of operations by the justice and psychiatric systems has been sufficient to prevent the target from informing the public, the area of discrediting targets is an ongoing activity. Like sabotaging the target’s reputation, discrediting their public statements, web sites, media appearances, letters to the editor and the like are done under the supervision of psychologists and psychiatrists on their staff. If a community-based agent (CBA) has a good track record of intelligently carrying out assignments, and has access to a computer, the CBA may apply to the local Control Center for assignment to discredit work. Excellent communications skills are required. Some of the activities CBAs carry out under supervision are:

-Monitoring message boards, Wogs, and open media like Indy media for target posts.

This is normally done in special shifts and under scheduling and control at a higher level than your local CC. This monitoring is assisted by blog scanning software which will detect and instantly flag posts relating to activities. The CBA doing this work will immediately reply with comments like “Someone isn’t taking their medication” or “target name” has provided absolutely no evidence.” The CBA will then report the post to higher level supervisors for possibly more detailed responses.

-Monitoring newspapers in your area for letters to the editor regarding activities. Most editors and many reporters have been recruited and are willing to assist in keeping the important work of monitoring and neutralizing quiet, but once in a while, a letter to the editor will slip through. In this case, comments like “Someone isn’t taking their medication” are not an appropriate response. Transcribe and forward such a letter to the editor to the supervisor, along with your proposed response. The supervisor may edit your response, and will assist in ensuring your response is printed.

-Your supervisor will have staff monitoring upcoming talk show appearances by targets. While most talk show hosts, even those somewhat sympathetic to targets, have received discrediting information and often will not host targets, some targets do manage to get on the air. In this case, your supervisor will assign you to call in to the show, and instruct you as to appropriate things to say, such as rebutting the target’s claims, pretending to be a target calling and making “wacko” statements such as “UFOs are harassing me,” or pulling the discussion away from real activities and to something like “media mind control.”

-Agents who have excellent persuasive communication skills can be assigned, with careful coaching and preparation from supervisors, to pretend to be a target and get on talk shows known to air targets as the guest. These opportunities are great ways to discredit targets by talking about UFOs, things like black helicopters following you, foil beanies, satellites “parked” just above your home, and perhaps events normally considered “paranormal” like seeing (things that) appear and disappear. These discrediting topics must be a total surprise to the host, only mentioned after the show is in progress.

-CBA can “casually” describe the “odd behavior” exhibited by the target as a result of around the clock activities to the target’s neighbors. The idea is to focus the neighbors’ attention to the target’s behavior, hinting that maybe the target is mentally ill. This is easy once the target has developed suspicion that “everyone is out to get” him or her.

It is a special “honor” for CBAs to be chosen for target discreditation work.

7. TRADE-RELATED PUNISHMENT

This section will give some examples of ways community-based agents (CBAs) with specific trades or situations in the community can apply deniable punishment to targets.

-Underground utility crews, where the management has been recruited, schedule messy, noisy maintenance at the target’s home (or business if the target runs a business). This can include having the street torn up for extended periods, or repeatedly. Fundng for unneeded work is available from headquarters. Taxi drivers can delay arriving when called by the target, especially when going to the airport.

-Bus drivers have leeway, in nasty weather for example, to stop one stop away from awaiting target and wait there for perhaps 5 minutes, ostensibly to “get back on schedule.” This can also cause a target to miss connections with the next bus or train. This is especially effective when the target, exposed to bad weather, can see the bus waiting up the street for no apparent reason, or not stopping at all at your bus stop.

-Repair trades people can keep “getting it wrong” necessitating many recalls, be late, be messy, over-bill the target, and even damage things which were OK. This is especially effective in the automobile repair trade.

-Medical lab technicians can substitute blood samples, or otherwise falsify results making the target appear to have absolutely no reason for their complaints.

-Police can frequently pull the target over for frivolous reasons.

-Telephone and cable TV technicians can re-route legitimate calls to the target’s number in large numbers, and this will cause the target to get very angry with these totally innocent callers.

-Store staff where the target shops frequently can be instructed to remove items the target is known to need when a target is known to be coming. Store management can stop ordering a target’s favorite items.

-Restaurants and food delivery services can tell the target they are out of an item known to be a favorite of a target.

The key to successful punishment by trades people is that while the target is very likely to know they are being punished, these punishment acts must appear to the general public as “life’s normal breaks.”

8. TARGET’S HOME

Punishing the target at the target’s (home) is essential for effectiveness of secret service operations. If the target were punished in the community but was allowed sanctuary in their home, the creation of a “prison without walls” would not be complete. One of the very first things the Control Center (CC) will arrange is for homes or apartments adjacent to the target’s home to be occupied by both community-based agents (CBAs) and members in the Electronic Operations manual. Because operations are carried out 24/7 in shifts, homes and apartments which are leased or owned by staff are not used as dwellings. The lease or deed will bear either an entirely false name, or the name of a senior staff member whose actual home will be at a different location.

Some adjacent homes or apartments are occupied by neighbors of the target who have offered to cooperate in punishment of the target. The initial contact of neighbors to determine their willingness to cooperate is done by senior staff, and incentives to cooperate are often tendered. Here are some commonly used punishment activities which are carried out both by CBAs and cooperating neighbors of the target. Activities are rotated among the choices, but at least one of them is applied daily:

-Noise. Noise must be of a type which the general public deems “normal.” Remember that the goal is to have the target aware they are being punished, but not be able to convince anyone else that that is the case. Observe local noise curfews, but plenty of punishment can occur outside noise curfew times. The target must not have easy cause to involve law enforcement. Examples:

-Start leaf blower, times precisely when the target attempts to enjoy their yard, or when EC operators cue the CBA that the target is trying to nap.

-Loud music from neighboring home. This is an excellent action, as it is common. Time it so every time the target opens a window the music starts. The timing makes the point it is intentional punishment. EC operator can apply music in adjacent apartments with exceptionally powerful bass, directed at the target’s unit.

-Frequent squealing of tires near target’s home.

-In apartments, frequent drilling into a scrap of wood or masonry held against the target’s wall, floors or ceiling as if “working.” Alternatively, hammering. Especially effective when cued by EC operators that the target is attempting to nap.

-Tossing golf or tennis balls against the target’s home when the target is known to be trying to fall asleep. Ideal for cooperating neighbor children.

-Frequent use of sirens near the target’s home. Many emergency services employees have a strong sense of community service and willingness to cooperate in this, or by people posing as Jehovah’s Witnesses.

-Knocking on the door for frivolous/nonsensical/wrong address reasons. Especially effective when the target is in bed or having a meal.

-Trash. Leave trash in the target’s yard. Frequently, but CC staff will assist in scheduling this so that the target can’t quite have a case on which law enforcement will act.

-Terrifying the target’s pet. This requires entry while the target is away from home for an extended period and must be scheduled by CC. Electronic Corps (EC) operators can render a dog or cat passive for safe entry of the community-based agents, by electromagnetic beam.

-Wounding or killing the target’s pet. Rarely used, scheduled when the target has acted in a way so as to deserve special punishment, like divulging the name of a criminally acting secret agent.

-Killing domestic animals or wildlife and leaving them on the target’s doorstep. Scheduled when the target has acted in a way so as to deserve special punishment.

-Where the target owns substantial land, noxious activities can be arranged and built for next to the property. In one case, a dump, an auto race track, and a prison were built adjacent to a target who owned a large farm in an area of natural beauty. While this is rare, it does illustrate commitment to delivering punishment to those “deserving” of it.

-Cooperating police departments can visibly watch the target’s home. Possibly being parked in front of the home when the target returns, repeatedly.

Police officers who refuse to take complaint of harassment and sabotage of the target, who they label “disturbed” – really are NOT allowed to make diagnoses, as only medical doctors can do, but may get a raise- price- for their unlawfulness afterward. Police follow orders by e.g. Stay Behind, Secret Military-led organization, created by the CIA after WWII in NATO countries. They give orders in secrecy to police, media, legal system, and judges, etc. Thus, being above parliaments and governments as demonstrated, for example, in Norway when in 1957 the Chief of “Stay Behind” Sven Ollestad gave the security code of Norway to MI6 (British Intelligence) in the UK acting on his own! “We have to trust our allies,” he had said. Today, the security code of Norway is kept in Wales. Originally, Stay Behind was created with good intentions to fight communism. Today it is out of control, and a new, much bigger Stay Behind 2 is active in Norway. The Stay Behind logo resembles the NATO logo.

In Italy, Stay Behind was called Gladio 2 and dealt with terrorism secretly in Western Europe. It was responsible, for example, for the kidnapping and killing of Prime Minister Aldo Moro in 1978, while the blame was pinned on the Red Brigade. Today, enemies are communists and NATO (is the) opposition.

On November 22, 1990, the European Union forbade Operation Gladio, but although Norway follows most EU decisions, this one is omitted. Italy and Belgium had terror actions by Stay Behind, and when the organizations (ceased to exist, the terror operations also ceased to exist). In Norway, Stay Behind is called E14. What was its role in Norway’s terror actions, if any? Some have tried to get control of Norwegian Stay Behind (armies) already years ago. Who are the back men giving orders to those “officially” in charge?

-Computer programs predict exactly when and where a target will be as they move through the community.

-OSS has special means of receiving instant, silent instructions for the Center.

-Intercepts are where CBAs appear to “just coincidentally” cross paths, on foot or by vehicle with the target.

-The ultimate vehicle intercept is the staged accident… excellent means of punishment where target has committed serious offense specifically against secret services by revealing their criminality to the public.

-Sabotage lets the target know they are totally helpless to stop harassment

-Thefts must be authorized by local Control Center

-Sabotage of target’s reputation- is special operations category- done by spreading rumors, consisting mainly of lies. The goal is to keep negative information about the target flowing through the community.

-The organization has many top psychologists and psychiatrists on permanent staff at headquarters. Their job is to design campaign to destroy target’s reputation.

-“Incentives” are offered to get neighbors, friends, community members to cooperate

-The “Organization has powerful silent support of operations by the justice and psychiatric systems

-Monitoring newspapers for letters to the editor regarding these activities.

Terrorism- The US and its allies will terrorize the civilian population to achieve political objectives. The DOD stated: “Some IW activities, such as terrorism and transnational crime, violate international law. US law and national policy prohibit US military forces or other government agencies (OGAs) from engaging in or supporting such activities. However, since our adversaries employ terrorism and transnational criminal activities against the interests of the United States and its partners, these activities are included… as examples of the range of operations and activities that can be conducted as part of IW (Information Warfare).”

4GW – Fourth Generation Warfare- is a form of political/information warfare waged against civilians by a state or other entity. It utilizes civilians and the military, indeed all of society, to target civilian adversaries (aka “domestic state enemies,” “insurgents,” extremists, non-state actors, “cells of fanatics,” citizen “terrorists”) who value national sovereignty and/or pose some perceived threat to the state’s interests. Anyone disseminating information contrary to the state’s (“national security”) interests may become an enemy. The goal of the New War is the psychological collapse of the new enemies using a combination of tactics. Defeating the new enemies involves the synchronized use of non-lethal directed energy weapons, isolation, deprivation, and PsyOps against individuals and groups (aka TA, target audience and TI, targeted individuals). 4GW is more or less synonymous with unconventional warfare (UW), irregular warfare (IR), asymmetric warfare (AW), low-intensity conflict (LIC), military operations other than war (MOOTW), and network-centric warfare (NCW). This new war involves international, interagency cooperation between the military, federal and local law enforcement, non-governmental organizations (NGOs), intergovernmental organizations (IGOs), the civilian population/private voluntary organizations (PVOs), and private government contractors. This multinational force (MNF), involving NATO (North Atlantic Treaty Organization) and the UN, is termed civilian-military operations (CMO). TI – targeted individual (insurgents, non-state actors (NSAs), dissidents, terrorists, asymmetrical threats, irregular threats, potential enemies, etc.)

Insurgents – those who try to persuade the populace to accept political change. The enemy does not necessarily use violence to promote social change. Their methods may be nonviolent. These are groups of individuals not under government control, against the established leadership, who will be targeted because of an action they might take in the future. These may include nonviolent protesters who are labeled as terrorists. They may ‘wrap themselves in nationalism.’CMO – Civilian-Military Operations- combines military, federal agencies, NGOs, civilian organizations and authorities, and the civilian population. CMO is used in friendly, neutral, or hostile operational areas, including populated civilian areas in which no other military activity is conducted. It is used to deal with domestic threats in the New War. The controlling faction of these PsyOp/CMO activities includes the military, federal agencies, NGOs, regional organizations, and international organizations that work with civil authorities. (In the US, this means the controlling faction is FEMA, DOJ, CIA, and other federal agencies (FBI, DHS, etc.). Civilians are used as irregular forces. CMO are interagency and global in nature. In the US, they are used as part of Homeland Security.

CMOC – Civilian-Military Operations Centers- is established in the civilian sector for exchanging ideas. It may be a physical meeting place or a virtual one through online networks. Daily meetings are attended by representatives of the military, NGOs, the private sector, and local officials. Discussions at these meetings may include any ongoing campaigns against domestic threats in the area of operation.C4ISR- Command, Control, Communications, Computer Center that utilizes Intelligence Surveillance and Reconnaissance. Multiple interacting components of C4ISRs include battlespace monitoring, awareness, understanding, sense making, command intent, battlespace management, synchronization, and information systems. C4ISR centers can be mobile or stationary, or virtual, or strictly computer-based. Each military service has its own tactical mobile C4ISR system; The Navy and Marines use ForceNet, the Air Force uses Command Control Constellation (C2 Constellation), the Army uses LandWarNet and WIN-T. Each type of C4ISR system is connected to GIG (global information grid).

CR – Cognitive Radio- (a kind of JTRS, or Joint Tactical Radio System) that consists of a computer which has AI (artificial intelligence). CR is an intelligent device that is aware of itself, the needs of the user, and the environment. It can understand and learn. DARPA helped create CRs through programs like the Adaptive Cognition-Enhanced Radio Teams (ACERT), and Situation Aware Protocols in Edge Network Technologies (SAPIENT).

GIG – Global Information Grid- developed partially by the MITRE Corporation, has been called DOD’s global C4ISR unit for netwar. It can quickly track down an adversary (target) anywhere on earth and attack them via DEW (directed energy weapons) and other forms of electronic warfare (EW). GIG uses existing commercial satellite and ground-based systems as well as GIG nodes such as aircraft, vehicles, and ships equipped with DR (JTRS). GIG is connected to all communications systems used by coalition and allied forces.

GWOT – Global War on Terror- use of 2nd, 3rd, and 4th generation warfare to achieve political/military objectives of the American Empire and New World Order.

In terms of activities of the internal enemy,” official sources suggest the act of simpoly conveying information alone can be described as IO. In this case, it is usually waged by people within oppressed populations.

In terms of government/military use of IO, DOD defines IO as: “The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations security, in concert with specific supporting and related capabilities, in influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own.”

The 1999 “Air and Space Power Journal,” in an article called “What is Information Warfare?” states: Information Wafare is any action to deny, exploit, corrupt or destroy the enemy’s information and its functions; protecting ourselves against those actions and exploiting our own military information functions.”

This new war is fought for political purposes and revolves around the issue of gaining the support and influence of the population.

IW- Information Warfare- According to US Military and Defense Contractors, the “new enemy” use computers, the internet, fax machines, cell phones and public media to advance their objectives. They use “information operations” to influence state forces with the population. Various publications term the act of transmitting information “netwar,” “information operations,” “information warfare,” “information attacks,” etc.

Professor George J. Stein in “Information Warfare,” which appeared in Airpower Journal, stated: The target of information warfare, then, is the human mind…. The battle remains, the battle for the mind.”

What all this means is that the New War is an information war.

IO – Information Warfare-

Infrasonic and ultrasonic weapons- Infrasonic and ultrasonic generators, also called emitters and VLF modulators, are weaponized devices consisting of a directional antennae dish which can send acoustic pulses to a general or specific area. In 1972 France was using infrasonic generators which operated at 7 Hz on its civilian population. By 1973, the British was using the Squawk Box in Northern Ireland. This directional weapon could target specific individuals by producing an audible sound at about 16Hz which turned into infrasound at 2Hz when it coupled with the ears.

In early 1990s, Russia developed a 10 Hz VLF modulator adjustable up to lethal levels, capable of targeting individuals over hundreds of meters, causing pain, nausea, and vomiting.

As far back as 1997, the US DOD has been creating generators in the infrasound and ultrasound ranges (7 Hz and 20-35 Hz, respectively) which can cause these same effects.

These weapons can target the brain, causing changes in brain chemistry which influence thoughts and emotions. Particular frequencies and modulations will trigger precise chemical reactions in the brain, which produce specific emotions in the targeted individual.

Infrasound- Occurs within ELF range from a few hertz up to about 20Hz, which is the lowest limit of human hearing. From 1 to 250 Hz the pain/damage threshold seems to increase with frequency as well as power. Frequency determines what kind of damage occurs whereas power determines how much damage occurs.

Infrasound easily passes through buildings and travels great distances. Natural examples include avalanches, earthquakes, volcanoes, and waterfalls. Whales, elephants, hippopotamuses, and rhinoceros use infrasound to communicate over great distances…. For whales, hundreds of miles. An electronic example would be a large subwoofer. Infrasound is thought to be superior to ultrasound because it retains its frequency when it hits the body.

From about 100 to 140 decibels infrasound causes a variety of biological symptoms. Effects include fatigue, pressure in the ears, visual blurring, drowsiness, imbalance, disorientation, vibration of internal organs, severe intestinal pain, nausea, and vomiting. Higher power levels can liquefy bowels, and resonate internal organs to death. It can also cause feelings of pressure in the chest, choking, irregular breathing patterns and respiratory incapacitation.

Micro-wave hearing- aka “synthetic telepathy,” “Voice of God,” and V2K, Existing radar units can be modified to transmit a beam of pulsed microwave energy into a person’s skull which causes sounds like ticks, buzzes, hisses, knocks, chirps, and words. The sounds originate from within, above, or behind the head and are transmitted to the inner ear via bone conduction (thermal expansion). (Bone conduction is another pathway for sound transmission in humans and other mammals). There is no external noise. It can be applied from hundreds of meters away from a target using man-portable transmitters.

Dr. Allen Frey invented the technology in 1958. The transmitters use pulse-modulated waves at extremely low average power levels. In 1975, Dr. Joseph Sharp proved that correct modulation of microwave energy can result in wireless and receiverless transmission of audible speech.

DOD defines them as: “weapons that are explicitly designed and primarily employed so as to incapacitates personnel or material, while minimizing fatalities, permanent injury to personnel and undesired damage to property and the environment…. Non-lethal weapons employ means other than gross physical destruction to prevent the target from functioning.”

NLW are to be used in combination. The CFR states: “These weapons must be deployed coherently in synergistic coordination with information/psychological warfare technologies.” Similarly, NATO, in their 2004 and 2006 reports, “Non-Lethal Weapons and Future Peace Enforcement Operations” and “Human Effets of Non-Lethal Technologies” indicates that NLW should be used in combination to increase their effectiveness. The US Military states that the goal is overwhelm the target by attacking all five senses, plus motor and cognitive functions.

DOD defines them as: “weapons that are explicitly designed and primarily employed so as to incapacitates personnel or material, while minimizing fatalities, permanent injury to personnel and undesired damage to property and the environment…. Non-lethal weapons employ means other than gross physical destruction to prevent the target from functioning.”

PO – Peace Operations- the new war (4GW, IR, UW, etc.)- aka “peacekeeping operations” by the UN, are international, interagency missions to contain conflict, maintain peace, and form a legitimate government. Most are run by DPKO (Department of Peacekeeping Operations) of the UN. The US Army lists them as a type of MOOTW.

PolWar- Political Warfare- a translation of the German term, “weltanschuauugskrieg” (worldview warfare), which means the scientific application of terror and propaganda as a way of securing ideological victory over an enemy.

PsyOp- Psychological Operations, a major part of the New War and a core part of CMO (civilian military operations) that is combined with EW (electronic warfare) and CNO. PO involve syngergistic coordination of PsyOp, MILDEC, OPSEC, and EBO. PsyOp units work with the civilian population as irregular forces to attack target audience (TA) in the area of operation (AO). PsyOp operators profile TAs and TIs and devise themes to attack their TAs (target audience), which include TIs (targeted individuals). Ultimate goal of PsyOp is to modify the behavior of the TA by destroying their will using a relentless attack consisting of painful triggers. A type of audiovisual product known as PsyAct includes agents of action who carry out plays in the presence of the TA. Every single channel of communication the TA uses for information is interfered with.

PsyActs – psychological actions- aka “F2C”- are audiovisual products consisting of “agents of action” who deliver messages to a TA (target audience or individual). Agents of action follow a set of guidelines while “play acting” to deliver the messages. PsyActs usually utilize multiple people to transmit messages. Themes are presented in a performance similar to a play or movie production. (Hence, the term “surveillance role player”). Words like sets, props, performance, theatre, actors, cast, script, audience, etc. are used.

The military sometimes actually employs people from theatre actor guilds and modeling agencies. PsyActs can occur during rallies, rumor campaigns, group meetings, lectures, theatre, plays, speeches, dances, banquets, fiestas, festivals, religious activities, talks with individuals during interviews on talk radio shows, and other social activities. Messages may be subtly transmitted during these events. Agents of action follow general scripts that can be modified as needed. This type of communication includes “key words” or phrases spoken by the actors in the presence of the TA.

PO- PsyOp- Psychological Operations, – US Military states that the ultimate goal of PO is to modify the behavior of the TA (TI) by destroying their will. This is brought about by continually inflicting pain. This is accomplished by a relentless campaign used to demoralize the TI that will create perpetual feelings of intense fear and hopelessness. The DOD describes this as an “attrition-based approach:” “Attrition is the product or gradual erosion of the will. The victim of this psychological attrition gradually becomes convinced that nothing he can do will yield a satisfactory outcome to a situation.”

In PO, themes are used to transmit painful stimuli (also called triggers) through all his/her channels of communication which a TA (TI) has been sensitized to. Triggers/themes are understood at the strategic, operational, and tactical levels of the campaign and they are passed to various commanders of particular AO if the TA moves towards that portion of the battlespace.

The triggers are part of a behavior modification program called NLP (neuro-linguistic programming) which uses anchors and triggers to promote change. An anchor is created when an emotional state is linked to something such as an object, person, sound, smell, place, color, etc. Once the anchor is established, whatever the individual was exposed to during the anchoring process becomes the stimulus (trigger) that will provoke the emotion. So basically, PO is simply a series of “stimulus-response” interactions.

PO= aka or “information operations,” military deception (MILDEC), effects-based operations (EBO), neocortical warfare, political warfare (PolWar), and psychological warfare (PsyWar), aka command and control warfare (C2W), are a major part of the New War and a core part of CMO (civilian-military operations) that is combined with EW (electronic warfare) and CNO.

Po’s are a planned process of conveying messages to a target audience (TA) to promote certain attitudes, emotions, and behavior. These messages are typically conveyed using a line of persuasion known as a theme. TA (target audience) can be a group or an individual.

The DOD and CFR consider PsyOp a NLW to be used on civilians. PsyOp units work with the civilian population as irregular forces to attack target audience (TA) in the area of operation (AO). PsyOp operators profile TAs and TIs and devise themes to attack their TAs (target audience), which include TIs (targeted individuals). Ultimate goal of PsyOp is to modify the behavior of the TA by destroying their will using a relentless attack consisting of painful triggers. A type of audiovisual product known as PsyAct includes agents of action who carry out plays in the presence of the TA. Every single channel of communication the TA uses for information is interfered with.

In “gang stalking/electronic harassment,” PsyOp is synchronized with EW (electronic warfare with directed-energy-weapons), CNO (computer network operations), and all other instruments of national power. The battlespace is your neighborhood and the war is global.

Early PsyOp research was done by a small private network of think tanks, foundations, and academic institutions, which went into partnership with government agencies and kept most of the results of their studies secret. Some of the institutions that conducted these studies were known to be subversive. Thus, much of the modern PsyOp was built by a small group of private interests, using the social sciences to install a global government. Some of these are the exact same groups promoting the use of PsyOp on civilians.

RF – Radio Frequency Weapons

Rumor Campaigns- used by PsyOp units to isolate TIs. Primary elements include the source, the rumor, and the receiver-repeater (R2).

Similarly, the US Marine Corps document, “Multiple-Service Concept for Irregular Warfare” (2006) states: “frightening the population into inactivity is sufficient to (achieve) our goals.”

TPD – Tactical PsyOp Detachment- team of about 13 personnel with a captain and staff sergeant. It is comprised of several TPT (Tactical PsyOp Teams) and provides tactical PsyOp support to brigade and battalion-sized units in support of Special Forces. TPT conducts mission assessment, determines distribution priorities, and tracks the various products that have been distributed throughout the AO. All teams maintain contact with each other. And the TPD is in constant communication with other forces such as the TPDD, POTF, or TPT during the entire operation.

TPT- Tactical PsyOp Team- small group including team leader, his assistant, and a PsyOp specialist.

CNO- Computer Network Operations- aka NW Ops, or network operations/NetOps) are information warfare attacks used to deny, deceive, degrade, and disrupt networks and computers used by the enemy. These are used in conjunction with PO (PsyOps) and EW (electronic warfare). This includes destruction of hardware and software (degrading, attacking) and spoofing (deceiving). The battlespace includes the internet. Internet applications that can convey PsyOp messages include email, websites, and chat rooms. When a TI goes online, they are entering the battlespace.

Web spoofing allows an attacker to create a copy of the worldwide web. The Air Force mentioned that an enemy’s internet could be spoofed to conceal one of its weather attacks: “Spoofing options create virtual weather in the enemy’s sensory and information systems, making it more likely for them to make decisions producing results of our choosing rather than theirs.”

In their “Electronic Warfare” publication, DOD defines DEW as: “DE (directed energy) is an umbrella term covering technologies that produce a beam of concentrated EM energy or atomic or subatomic particles. A DE weapon is a system using DE primarily as a direct means to damage or destroy adversary equipment, facilities, and personnel. DE warfare is military action involving the use of DE weapons, devices, and countermeasures to either cause direct damage or destruction of adversary equipment, facilities, and personnel, or to determine, exploit, reduce, or prevent hostile use of the EMS through damage, destruction, and disruption.”

The two basic types of DEWs include microwaves and lasers. (Wavelengths of lasers are about 10,000 times smaller than microwaves). Both are part of the electromagnetic spectrum. The two main types of microwave weapons are millimeter wave devices such as the Active Denial System (ADS) and the electromagnetic bomb (e-bomb, which is the emission of a non-nuclear electromagnetic explosion or pulse).

DEW travel at the speed of light, are surgically accurate, can operate in all weather, are scalable, are silent and invisible (offering plausible deniability), their energy can pass through walls at distances of hundreds of meters to miles, and have long distance projection (tens of miles).

These weapons are mounted on platforms which can be a missile, aircraft, ship, vehicle, suitcase, radio, etc.

On November 22, 1990, the European Parliament passed a resolution on Operation Gladio. Joint resolution replacing B3-2021, 2058, 2068, 2087/90

A. having regard to the revelation by several European governments of the existence for 40 years of a clandestine parallel intelligence and armed operations organization in several member states of the community,

B. whereas for over 40 years this organization has escaped all democratic controls and has been run by the secret services of the states concerned in collaboration with NATO,

C. fearing the danger that such clandestine network may have interfered illegally in the internal political affairs of Member States or may still do so,

D. where in certain Member States military secret services (or uncontrolled branches thereof) were involved in serious cases of terrorism and crime as evidenced by various judicial inquiries.

E. whereas these organizations operated and continue to operate completely outside the law since they are not subject to any parliamentary control and frequently those holding the highest government and constitutional posts are kept in the dark as to these matters,

F. whereas the various “Gladio” organizations have at their disposal independent arsenals and military resources which give them an unknown strike potential, thereby jeopardizing the democratic structures of the countries in which they are operating or have been operating,

G. greatly concerned at the existence of decision-making and operational bodies which are not subject to any form of democratic control and are of a completely clandestine nature at a time when greater Community cooperation in the field of security is a constant subject of discussion.

1. Condemns the clandestine creation of manipulative and operational networks and calls for full investigation into the nature, structure, aims and all other aspects of the clandestine organizations or any splinter group, their use of illegal interference in the international political affairs of the countries concerned, the problem of terrorism in Europe and the possible collusion of the secret services of Member States or third countries;

2. Protests vigorously at the assumption by certain US military personnel at SHAPE and in NATO of the right to encourage the establishment in Europe of a clandestine intelligence and operation network;

3. Calls on the governments of the Member States to dismantle all clandestine military and paramilitary networks;

4. Calls on the judiciaries of countries in which the presence of such military organizations has been ascertained to elucidate fully their composition and modus operandi and to clarify any action they may have taken to destabilize the democratic structure of the Member states;

5. Request all the Member States to take the necessary measures, if necessary by establishing parliamentary committee of inquiry, to draw up a complete list of organizations active in this field, and at the same time monitor their links with the respective state intelligence services and their links, if any, with terrorists action groups and/or other illegal practices;

6. Calls on the Council of Ministers to provide full information on the activities of these secret intelligence and operational services;

7. Calls on its competent committee to consider holding a hearing in order to clarify the role and impact of the “Gladio” organization and any similar bodies;

8. Instructs its President to forward this resolution to the Commission, the Council, the Secretary-General of NATO, the governments of the Member States and the United States Government.”

9. OTHER TACTICS (Dr. Rauni Kilde)

There are other tactics which are not strictly part of the categories discussed so far:

-IMPORTANT: Community-based agents (CBAs) are strictly forbidden from adding anyone to the list of targets. Target selection is done by senior Control Center (CC) staff or higher levels.

-Punishment of people who side with and help the target. Friends, family members, and citizens who do not place a high value on community sometimes help targets. In these very specific cases, CC-authorized punishment in the form of individual acts against them is appropriate. The system can arrange for these target sympathizers to be found guilty of crimes, or liable for civil actions, for example. This is important for maintenance of the system.

-Target bank accounts can be disrupted in ways which do not give the target cause to involve law enforcement. Examples: target protetion can be changed to “youth account,” or, an overdraft protection feature can be disabled, or simply steal money from the account. It is called action of “international banking ring” and usually at first the sums are around 50 – 100 dollars which are ataken when the target pays small bills.

-Money is never transferred to the journal subscription or membership in a certain club like “opposition to government surveillance.” Money simply “disappears” from the bank with help of cooperating employers. I have experienced the myself several times. Bank accounts are “hacked” for the payment and a new bill arrives for the already paid bill by the target, and the receipt of payment is stolen. There is cooperation with military intelligence, Stay behind, NATO, and foreign intelligence agencies also against their own population. (This is the) so-called secret silent war going on in all secrecy.

Appendix 4: From Total Individual Control Technology by Omnisense

Organized Stalking/Electronic Harassment. The New Hi-Tech Generation of COINTELPRO

In a Nutshell: Government sources are using directed energy weapons and artificial intelligence to terrorize, threaten, intimidate, discredit, silence, torture, and murder dissidents. In addition, security contractors (among others) are being hired as military thugs to gangstalk targets[19].

Zerzetsen: “Inflicting as much pain and suffering as possible without leaving any marks.[20]” Directed energy weapon programs revolutionized this…

Counter-proliferation programs are intended to subvert the potentials of a target while punishing them with psycho-sadist techniques. The perversions of cointelpro are notable. The murderous and sadistic ethos of government counter-proliferation programs echos that of the Nazis and this perpetrator network of war criminals are committing sickening acts upon the global population.

Modern Day COINTELPRO Objectives:

These are counter-proliferation centered programs intended to subvert all progress

To discredit the target / To character assassinate / To slander the target

To taint the target’s image / To misrepresent the target

To suppress the target’s monetary success

To suppress the target’s good character qualities or people’s awareness of positive aspects of the target

To arrange a partner for the target or mind control the partner of the target

To destroy relationships of the target

To co-opt the target’s manifestation

To turn the target into controlled opposition (In terms of beliefs & actions)

To incriminate the target

To round down the target’s output and audience – To marginalize the target

To eliminate connections & networking ability

To suppress the target’s personality

Sanitization of pleasure, emotions, and individuality

To punish the target / To torture the target

To destroy the target’s life

To stop a target from procreating / Ending a target’s bloodline (Eugenics)

To suicide the target / To covertly assassinate the target

To cover up the targeting operation

“If they see too much power and originality coming out of someone, they either use it and siphon it or they undermine it in order to neutralize it.” ~Ahmad Enani (TI)

“While all these traditional tactics have proven fruitful throughout time without waning effectiveness, the agencies involved in extreme cover-ups prefer another tactic that seems to have withstood the test of time too. That is labeling someone “paranoid schizophrenic” or mentally ill. Once that label has been attached to someone, almost all testimony will be disbelieved. The military has employed this tactic since the 60’s to get rebellious soldiers and others locked up in mental hospitals. But since the weapons testing of neurological disruptor technology has begun on the general population beginning in the early 60’s and then stepped up to full throttle in 1976, the scope of what is considered mentally ill had to be reprogrammed into a broader definition for the general population.” ~Department of Defense Whistleblower: From the Out of Print Book – The Matrix Deciphered

“My name is Dr. John Hall, I’m a medical Doctor from Texas. As a physician, relative to some of what you’re hearing today, in the community we are seeing an alarming rate of complaints of use of electromagnetic weapons, microwave auditory effect, silent sound spectrum, EEG cloning,… Which has taken the lab out of the laboratory and into the home, most of these from the research that we’ve reviewed can be done remotely. It seems to be more weapons research than medical research. I’ve personally corresponded with upwards of 1,500 victims all complaining of identical complaints from every state in the nation. Of being exposed to electromagnetic radiation. Non-ionizing radiation. For the use of cognitive control or behavior control….” ~Anesthesiologist Dr. John Hall Speaking to the Presidential Bioethics Commission

“I am also targeted and this is my story. My name is Sandra Fields. I’m an architect, recipient of Who’s Who of Women in America achievement award and have run a successful business for over 28 years. My life and livelihood have been compromised for the last 11 years by being attacked by electromagnetic radiation torture, and by organized stalking… Thousands of Americans are currently suffering from chemical, electromagnetic, psychological and physical torture with no government relief or laws. Our servicemen, prisoners, and thousands of unknowing innocent civilians are currently being lamed, tormented and tortured as a result of military research, medical research, pharmaceutical research, physiological and psychological studies that have virtually destroyed participants’ sanity, physical well-being, reputation and privacy.” ~Targeted Individual Sandra Fields, Speaking to Obama’s Presidential Bioethics Committee

“What the governments found, was that you could induce by changing the pulse frequency like morse code of the microwaves going into the brain and interfering with the brain, by specializing on the pulse frequency you could induce psychiatric illnesses to the point where a psychiatrist could not tell if it is a genuine psychiatric illness or an induced psychiatric illness. So what you can do theoretically, is you can target an individual’s brain, they may have auditory hallucinations where they hear things, which is actually quite common with microwaves. Or show signs of schizophrenia, for instance 6.6 pulses a second can induce severe sexual aggression in men. … Technically what you could do is have someone committed to a psychiatric hospital or a jail for a crime, just by somebody saying that they had a psychiatric problem where by they didn’t.” ~Ex-British Royal Navy Scientist Dr. Barrie Trower

“They can cause insanity, and it was an experiment. One of the experiments was to take an ordinary sane person, cause insanity, and have a psychiatrist who was unknown to everybody diagnose schizophrenia, or paranoia or a psychiatric illness. That was a successful outcome. And the person would spend the rest of their life in an asylum in misery, but to the government scientists that was a success.” ~Ex-Black Project Scientist Dr. Barrie Trower

“The war against satellite terrorism isn’t just the USA. This is a global issue! I’m in tropical Queensland Australia and get battered daily.” ~Targeted Individual Amanda Emily Reed

MKULTRA Cover Stories

This technology has interacted with quite a large amount of people, however it is almost always misidentified as other sources[8].

Directed Energy Weapon Cover Stories:

Mental illness as an electronic harassment cover story

End game technology packaged under persuasive “spiritual warfare” illusions

Directed energy interaction packaged as the supernatural

Government technology under a cosmic being facade

Religious themed illusions / Using religion mythology as a means for cover stories

Person’s of Note (e.g. To get a Target to Murder them, To Psychologically Direct)

Any Mythological God of the Past (These can be pretty cool)

God / Allah / Yahweh / Jehovah (Impersonation of the Highest Power)

Done via Electronic Telepathy Contact (Voice to Skull – v2k)

“Directed energy weapons operate invisibly while the inducible mental limits of directed energy weapons are the limits of consciousness itself, this makes for an incredibly potent environment for illusions of all types.” ~Omnisense

NeuroWeaponry & Artificial Intelligence Quotes

“The point of the program is to have maximum psychological effect and leave the minimal amount of evidence.[22]” ~Anonymous Targeting Program Insider

“In 1985 CNN did a special report on radio frequency weapons. They hired an engineer who built an “RF Mind Interference” machine based on Soviet schematics. The machine successfully transmitted images into a CNN reporter’s mind. The stunned engineer said that, given three weeks time, he could scale up the machine to use on a whole town, causing them to do things against their better judgement, see and hear things that weren’t there, etc. The pentagon said it was too sensitive a subject to comment on. Remember, these effects were achieved by civilians over 30 years ago! One can speculate that they’ve made great advances in the past decades.[8]” ~Targeted Individual Jim Hastings

EPILOGUE

It is now possible to state, with complete assurance (and also to distribute fliers such as used in the days of the lawless American Wild West:

WANTED:

FOR THE MURDER OF DR. RAUNI KILDE, GLORIA NAYLOR, AND HUNDREDS OF THOUSANDS TO MILLIONS OF OTHER INNOCENT CIVILIANS:

THE FBI/CIA/DHS, U.S. GOVERNMENT, MILITARY, AND INTELLIGENCE SERVICES AND THEIR CORPORATE SPONSORS AND PARTNERS (aka The New World Order)

One of the key trademarks of the Soviet Union which fell in 1989 (thanks to the secret negotiations of VT’s own Lee Wanta) was its unwarranted detainment and persecution of dissenters in mental hospitals.

Some were arrested through mistakes and by complaints made by disgruntled neighbors, others because they spoke out even quietly against the Communist party practices or read western-published goods.

After the mass-murder of priests, Christians, doctors, lawyers and farmers, elaborate delusional rituals were concocted by the Soviet State to demonize dissenters in order to justify their frequent arrests, detainment, persecution and torture, with many sent to gulags for long sentences.

These arrests, detainments and torture pleased the twisted, sadistic, cold-blooded, soulless Khazarian Communist party officials, who ordered such arrests and satisfied their demonic, satanic blood-lust.

Many Russian non-Khazarians were murdered outright, with many later sent to the Siberian Gulags for long sentences, where many died of various causes, such as malnutrition, starvation and disease. All this has been well-documented in Solzhenitsyn’s classic book, Gulag Archipelago.

The Soviet System was founded on the promises of Marx to create equality for all and get rid of the privileged class, but ended up just the opposite.

The result was a small privileged ultra wealthy ruling class of Khazarian communist party officials, the mass-murder of many Russians, and followed by the persecution of non-Khazarian truth-tellers, other dissenters and millions of innocents.

Yes, City of London Babylonian Talmudic Khazarians (Rothschild Khazarian Zionists, proponents of secret World Satanism) were responsible for placing Khazarian Bolsheviks Cutouts in control of mother Russia in 1917 and had also been able to hijack America in 1913 using Cutouts. Both the Bolsheviks and also the American Eastern Blue-blood Ruling Cabal were assembled and supported by the COL Babylonian Talmudic Khazarians. How’s that for a common etiology?

The soulless, demonic torturers and murderers of the Khazarian Bolshevik Red Terror were appointed and financed by the City of London (COL) private central Banksters and also some Wall Street banks at the orders of the COL. These COL Banksters are known to insiders as the international set of moneychangers, but best known as the Khazarian Mafia Banksters.

This international group of COL Franchised Banksters is also called the Babylonian Talmudics or Secret World Satanists, are are known to practice pedophilia, child sacrifice and even child cannibalism in their highest occult circles.

Their Satanic Pedophile Network (SPN) is believed to be worldwide and especially concentrated in Washington DC, Belgium and certain key cities like the wealthy small enclaves in California including Hollywood. They like to deploy the same weapons against society over and over again in all their targeted nations when possible. Thus what was done in Soviet Russia is being progressively rolled out in America, but is a very slow process with lots of setbacks along the way. In the meantime under Putin, the New Russian Federation has broken off from the COL Banksters and is becoming more and more like the Founding Fathers’ Revolutionary America of 1976.

James Perloff has done a magnificent job describing this Satanic Ruling Cabal run out of the City of London. The worldwide Satanic Pedophile Network is now being fully exposed in the alternative media by credible witnesses such as Ronald Bernard and many others.

What does the contemporary American social climate and political system have to do with Bolshevik Russia?

They both became controlled by City of London (COL) Zionists. Russia was taken over by COL appointed and financed Khazarians in 1917 via the Bolshevik Revolution, and America was secretly hijacked by COL-appointed and -financed Khazarians in 1913, with the illegal and unconstitutional passage of the Federal Reserve Act.

As soon as the Khazarian Bolsheviks took over in Russia in 1917 they began the world’s biggest genocidal slaughter in history, murdering about 100 million innocent Russians in the first round.

Those who have studied the secret history of this, (which has been cleansed from most libraries) know that it was ordered by COL Khazarian Banksters as revenge for Russia invading and destroying Khazaria in about 1050 AD for their unwillingness to stop terrorizing and parasitizing neighboring nations.

Note that the COL Satanic Khazarian Banksters have recently been doing everything they can to manipulate the USG and military into attacking and destroying Iran (formerly Persia) for the same reason, revenge for destroying their homeland in about 1050 AD.

The New Russian Federation under President Putin’s leadership will not let this happen and has used Russian Precision Air Power to defeat the CIA/Israeli mercenary ISIS et al, delivering the largest defeat for the CIA since their muffed Bay of Pigs.

Thanks to the determination of President Reagan and his personal Secret Agent Lee Wanta who was appointed and mandated under the Totten Doctrine, the Soviet Union collapsed in 1989 when an Agreement of Cooperation was signed. This agreement mandated that neither the New Russian Federation of the USA would ever meddle with any country bordering either nation. Since then the US has violated this agreement and appears to be attempting to provoke the new Russian Federation into war on several fronts.

It was quite easy for the well-financed City of London Bolshevik Khazarians to infiltrate, hijack and take down mother Russia in 1917. Once they had control, they instituted their Red error and mass-murdered about 100 million innocents.

Even though it was a slam-dunk to hijack America in 1913 through their Federal Reserve Act of 1913, it has been an exceedingly difficult task to remove all individual freedoms, trash the US Constitution and confiscate guns. Every time the Zionist Banksters have attempted to get the guns, Americans have resisted at all levels and ended up just buying more.

The COL Babylonian Talmudic Banksters are committed to destroying all nation states, destroying the nuclear family, destroying every nations’s borders, language and reducing the world’s population by 90%.

They are referred to by astute researchers and their top Kingpins as the destroyers of nations and whole peoples. These Babylonian Talmudic Satanist Banksters carry no ancient Hebrew Blood, are often referred to as the occultic Old Black European Nobility and most are of Khazarian Blood.

When these Babylonian Talmudic secret Satanist COL Banksters hijacked America in 1913, they soon found out it was going to be tough to attain their Globalist NWO agenda here. So they formulated a well-coordinated plan that involved creating numerous USG advisory foundations and groups and numerous federal agencies, which they would control and direct to assist them in their destruction of Constitutional America.

These Babylonian Talmudics set up advisory boards and USG departments to set all public education policy, all foreign policy, all domestic policy, and all economic domestic banking policy. It is no coincidence that they started the precursor to the FBI soon after 1913 to cover up all their crimes and to protect American Banksters franchised by the City of London.

Soon under J.Edgar Hoover, the FBI began using human compromise ops to blackmail and manipulate politicians, news editors and corporate leaders for the COL “Franchise Banksters” aka the American Zionist Cutouts of the COL Rothschild Khazarian Mafia Kingpins.

The Banksters set up the illegal, unconstitutional Internal Revenue Service as the collection agency for the Federal Reserve System. The IRS was incorporated in Puerto Rico where it remains secretly based today.

Through its extreme “money power” the Federal Reserve System was able to gain control over the corporations and stack the USG with their own Zio controlled corporate cutouts (whether they realized it or not) who they gained control over through various “round-table type” groups such as the CFR, the Pilgrim Group, the Trilateral Commission and many more such as various defense policy boards.

Things have gotten so blatant that we have seen Israeli espionage group AIPAC manipulating US Politicians to sign their Loyalty Oath to place Israel’s interests first even before that of the USG, otherwise they will be redistricted or voted out of office. Representative Cynthia McKinney refused to sign the AIPAC Loyalty Oath to Israel and was redistricted and voted out of office.

Of course signing this oath is technically treason and no sitting member of the US Congress that has done this should ever be allowed to hold any office. And as President Jack Kennedy wanted, all Israeli lobbying groups should be registered as foreign agents including AIPAC, the ADL and the SPLC.

The CIA was set up after WW2 to take full control over the Major Mass Media for the COL franchise Banksters. This was called Operation Mockingbird and according to William Colby shortly after he retired from the CIA, it was completely successful.

The CIA, using the black art mind-kontrol skills of Joseph Mengele obtained during Operation Paperclip was able to gain expertise with these Babylonian Black arts of soul-murdering children to produce extreme DID/MPD disorders that can be triggered by code words.

This allowed CIA operatives to gain total control over their minds and create normal appearing folks who could be”activated” at any time to act without their knowledge.

...

All wars are engineered by the 60+ families that own the big blocks of stock in the defense contractors and COL franchise banks.

All wars are engineered by the COL World Zionists and Israel has been their main action-agent and Cutout manipulating US Politicians while the USG has been the Zionists “main bitch” providing the unrestricted use of its military to wage wars. All American Mideast wars have been illegal and completely unconstitutional and have used good American soldiers as Israeli cannon fodder. Henry Kissinger, top Zionist stooge and Cutout referred to American soldiers one time as dumb cannon fodder.

Many mind-kontrol methodologies have been perfected by the COL Zionists for use in America and Israel to control the masses. And this has been done quite successfully too, allowing America to be taken into wars fought for Israelis-American “Israeli-first” Dual Citizens, Israelis and COL Zionists.

Edward Bernays methodologies have been used and proved very effective to condition desired USG beliefs in the American Mass Mind to produce support for these illegal, unconstitutional wars for Israel and the Zionists.

The deployment of Gladio false-flag terror, real and fake, has been used to successfully stimulate mass subconscious survival fear in the American masses which motivate them to give up basic God given human rights and constitutional rights for more protection by the USG.

This supposed increased protection always turns out to result in this increased USG power being turned against We The People.

The CIA was used to set up up MK-Ultra mind-kontrolled Vietnam Vets to be activated to mass-murder inside post offices. This has been called “going postal”.

This was an early big big experiment. The results were later being applied to other “gun free zones” like cities with no “shall issue” concealed carry laws, schools and universities.

The Zionist intent here was to use these false-flags to scare the masses into backing gun grabbing and the neutralization of the Second Amendment which failed miserably.

The Zionists next move was to deploy more and more MK-Ultra type “lone-nut” shooters into high schools and then grade schools to frighten and blood-shock parents as much as possible, hoping to then be able to grab more and more guns, especially large capacity automatics.

The Zios believe that unless America is disarmed they cannot complete their Agenda to destroy America’s borders, language and culture and completely Globalize America according to their secret Satanic NWO plan.

None of the Major Mass Media will ever mention the important part the CIA’s MK-Ultra has played in many of these so-called “lone-nut” shootings in gun free zones. Nor will they ever tell the truth that Oswald did not shoot JFK, but the CIA did it.

This all seems so incredulous; and most members of the public can just not fit it into their heads or believe it even when shown good photos and evidence. This provides a way for the evil occultists that do these horrendous crimes and to get away with it. Their crimes are just too horrible for most citizens to fathom.

So far these tactics have failed and resulted in even more gun sales, which confuses the Zios a great deal since this strategy worked in all European nations, Australia, New Zealand, Canada. So now the Zios have moved to a new tactic. That is more and more large scale, school mass-shootings. Some have been real; and many have been fake DHS Capstone drills using crisis actors.

Some experts believe a few may be hybrid mixtures to keep researchers confused, but it is hard to know for certain, because no one has had access to any ballistic evidence or actual autopsy videos, X-rays, photographs, DNA, fingerprints which are all required in every state by law.

The recent Valentines Day 2018 alleged mass shooting in a Parkland, Florida High School is just another example where evidence is being withheld by authorities, so we do not yet know if it was real or not, or a hybrid case.

Conclusion:

But here is the bottom line to all this current use of Gladio False-flag ops, whether fake or real, these are “strategies of creating societal tension”. The result Zios want is to create strong motivation in the public and the politicians to start mandating exigent police procedures which are completely unconstitutional.

These new procedures would allow the police to detain anyone who is accused by any authority, legitimate or not, appropriately trained or not, even a web service provider or any other poster. Any accusation against a person who posts dissent or whistle-blowing truth of being dangerous could then result in a call to the police, en exigent detainment in a psych ward for “observation and diagnoses”.

The desire here of the Zios is to see any dissenting author with alternative views or serious USG RICO crime disclosures, detained in a mental ward and have a full psychiatric evaluation (at their own personal cost of course, not the state).

Once this illegal, unconstitutional procedure is enacted, it will be easy to have Zio-controlled stooge psychiatrists or psychologists give the Zio-desired dangerous diagnoses, just as it was done routinely in the Soviet Union.

Here is an article that displays this new Zio motivation, since everything else they have tried has not only failed but backfired. They are getting increasingly desperate because they know their time is short. Why? Because the days of their US Petro-dollar being the world’s reserve currency are now running out and will soon end.

The new obsession of the Ruling Cabal (Zios) is now to formulate and mandate their own imaginary “pre-crime intervention strategies” based on what anyone publishes on the Internet. This would come to be accepted by LE as accepted exigent circumstances practice and would constitute a powerful weaponization of their web censors, who will closely monitor all social media and even private emails. If successfully deployed, this will be targeted at MK-Ultra patsies at first; and then alternative press researchers, many of whom have already been demonetized and adversely censored in many ways, with their websites hacked and tampered with.

Numerous alternative media Internet articles and videos have been recently censored by youtube labeling them with “violent content” or “unacceptable content” when there is absolutely neither in them. Even new, supposedly non-censored video services on the net are using extreme warnings for video when not indicated at all either.

This is exactly the kind of labeling that was done in the Soviet Union, which used extreme measures to label, detain, and persecute dissent of any kind. This all ended when the Soviet Union collapsed, thanks to Lee Wanta’s fine work and heroism, which probably prevented a nuclear WW3 at that time.

Few know about Lee Wanta’s vast fortune he made legally from money speculating at the time the Soviet Union fell, and how he is still being prevented access to a large 32 Trillion dollar trust. French Intel is now trying to help him gain access to it. In addition, few Americans know about Lee Wanta’s vast fortune and fewer yet realize that he plans to use all the money for the American taxpayer.

Since the Iron Curtain fell thanks to Lee Wanta’s work on Operation Stillpoint, the New Russian Federation under President Putin has become supportive of the Eastern Orthodox Christian Church, raised the lifespan in Russia by about 8 years; raised the standard of living a great deal, and promoted a free press that is actually quite good and open despite all the unjustified accusations of the Zios and their Controlled Major Mass Media in America.

As the new Russian Federation becomes more free and prosperous, America continues to descend into Soviet practices to stifle and oppress dissent and neutralize our Constitution.

The World Zionist Ruling Cabal is increasing the pressure to stifle dissent and emerging populism, largely because of the growing popularity of the Internet’s alternative media “Truther” News websites and articles, and the ever decreasing believability and popularity of their mainstream media and News Cartel.

Truly the Internet is the New Gutenberg Press, is revolutionary in its nature, and appears to be setting off a new enlightenment of populism worldwide.

And populism is the Zios’ greatest fear, because they know that once it reaches a certain threshold, they are finished and will be driven from power.